We use cookies to give you the best possible online experience. If you continue, we’ll assume you are happy for your web browser to receive all cookies from our website. See our cookie policy for more information on cookies and how to manage them.

Why Is This Important?

More and more companies are using AWS to develop internal and customer-facing applications. In fact, as of late 2015, AWS already had over one million businesses actively using their service to develop apps. Some will house sensitive data, some will connect to other apps, but all should be looked at closely to prevent cybersecurity risks.

The level of flexibility offered by Infrastructure-as-a-Service (IaaS) environments is a double-edged sword: while it allows organizations to create, delete, and modify complex virtual machines easily, it also means securing access can be difficult as it requires visibility beyond the infrastructure.

Amazon offers strong security for its AWS infrastructure, but the story doesn’t end there. Organizations are ultimately responsible for strengthening security around usage, unauthorized access, and modifications to configuration settings within the AWS environment. These types of precautions will increase visibility and protect against cyber attacks, insider threats, and human error.

Security Beyond The Infrastructure

This additional security layer protects businesses in three ways:

1. Protecting User Identities and AWS Instances in the AWS Admin ConsoleThe key to securing your AWS console is to restrict what users are allowed to do and what parts of AWS they are allowed to use. Ensuring privileged users are (a) who you think they are, and (b) not engaging in any suspicious activity that endangers the security of AWS instances, is key.

2. Protecting The Apps You Buy in the AWS MarketplaceBeyond protecting the admin console itself, security teams need to protect the data stored and manipulated within apps purchased from the AWS marketplace. Using advanced cloud DLP capabilities to monitor and prevent the loss of that data is a critical component to AWS security.Visit the CloudLock listing on the AWS Marketplace for more information.

3. Protecting Custom Apps You BuildIn order to secure apps that are custom built on top of AWS, security teams must find ways to protect against compromised accounts and data breaches without changing the way their applications are built.

The CloudLock® CyberDev Platform™ offers security for custom-built applications built on AWS or any other platform. Within the CyberDev Platform, we offer:

CloudLock CyberDev APIs: These connect to custom apps using a series of restful APIs. The advantage to this approach is that it’s very flexible; you can protect apps you build in the cloud and on-premises.

CloudLock CyberDev for IaaS and PaaS apps: Here, we pre-integrate with popular platforms such as Force.com and AWS to automatically and codelessly protect the apps you build on top of those platforms.

“CloudLock’s mission is to turn cloud security into a business enabler for organizations and people,” said Gil Zimmermann, CEO and co-founder at CloudLock. “With our expanded cybersecurity-as-a-service offering for AWS, we enable organizations to leverage the most advanced security controls for apps they buy off the shelf, or custom build themselves for some of the most advanced PaaS and IaaS environments.”

SIEM Integration. Connect natively to a number of SIEM solutions such as IBM QRadar, HP ArcSight and Splunk to tightly integrate into an organization’s existing workflow for incident resolution and risk visualization.

CloudLock for AWS is part of the CloudLock Security Fabric, a unified CASB and cybersecurity platform that provides centralized visibility for organizations looking to monitor their SaaS, IaaS, and PaaS environments for Salesforce, Office 365, Google Apps, Dropbox, Box, ServiceNow, AWS or any homegrown or custom app.

Looking to Secure Your AWS Environment?

Experience the benefits of CloudLock’s Security Fabric first-hand when you get a free security assessment of your cloud ecosystem, including SaaS, PaaS, IaaS, and IDaaS. Finding out exactly where your sensitive information lies is the first step to solving five primary cloud security needs: Threat Protection, Cloud DLP, App Discovery and Control, Risk and Compliance Management, and Auditing and Forensics.

Follow us

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser